Spam Classification With Artificial Neural Network and Negative Selection Algorithm

Size: px
Start display at page:

Download "E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm"

Transcription

1 Spam Classification With Artificial Neural Network and Negative Selection Algorithm Ismaila Idris Dept of Cyber Security Science, Federal University of Technology, Minna, Nigeria. Abstract This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self). We propose an optimized technique for classification; The are classified as self and non-self whose redundancy was removed from the detector set in the previous research to generate a self and non-self detector memory. A vector with an array of two element self and non-self concentration vector are generated into a feature vector used as an input in neural network classifier to classify the self and non-self feature vector of self and nonself program. The hybridization of both neural network and our previous model will further enhance our spam detector by improving the false rate and also enable the two different detectors to have a uniform platform for effective performance rate. 1. INTRODUCTION The traditional way of detecting spam based on signature is no more efficient for today systems. Recent years, Researchers are interested in the field of immune system in achieving computer security. The function of computer security systems are meant to recognize and discard spam. Data mining, machine learning and the signature base techniques are proposed for spam detection Christodorescu et al [2]. The signature base spam detection technique is not too reliable in detecting new spam since the number of spam grows concurrently in such a way that the signature based spam detection technique cannot meet up with its security challenges, putting in mind the increase signature database or the time it will take before matching takes place in signatures. The data mining techniques keep in memory specific bytes sequence obtain in the file content and also monitor the behavior of suspicious program. Our proposed technique has the capability to detect formally unknown spam. There is a relationship between any detector selected to one feature dimension leading to large dimensionality of feature. This will result in the reduction of high false positive rate; urge cost of processing which result in to low false positive rate. There are different classification techniques proposed with Artificial Immune System which includes Naïve Bayes, Artificial Neural Network (ANN), Support Vector Machine (SVM) and other hybrid approaches. (Kotter and Maloof,) and (Wang et al. ) [3, 4 ]. The novelty of this paper is to use the Negative Selection Algorithm (NSA) technique to generate an array of two element self and non-self vector as the feature vector of spam detector. We assume the self and non-self detector memory of [1] as containing bit string which are spam and non-spam respectively. The new self and non-self vector are constructed by using self and non-self detector memory to go through the fixed length segment of a program. The two element self and non-self vector of the program is then connected to form a feature vector in other to identify spam. 2. RELATED WORK The signature based techniques for spam detection is the most widely used method. It makes use of binary data mining to detect data when given a urge number of data and then use this data to detect data that looks similar in future detection. Henchiri and Japkowicz, [5]. The traditional technique as limitation in detecting spam adequately because it can only detect a small number of generics or extremely broad signatures. It finds it difficult in detecting new spam threats. The suspicious behavior technique provides protection from spam that are yet to exist in spam dictionaries which is not like signature based technique that is meant to detect existing spam. James Clark [6] proposed a neural network system meant for automated classification. He also presented an classification NN-based system used for automated e- mail categorization problem. This system is referred to as LINGER. It is an architecture meant for all kind of text categorization. Linger is adaptable, flexible and most of its operation are configured. It recorded a urge success in automated filing and filtering spam mail. An anti-spam filtering techniques was presented for Turkish natives by Levent Ozgur [7]; His techniques are centered on artificial neural network (ANN) and Bayesian Networks. Algorithm that was created by levent are meant for specific user and they use the characteristics of the incoming to also make adjustment on themselves. Ian Stuart [8] used from one user a neural network techniques on a corpus of messages in his research. Descriptive characteristics of words are the feature set used to determine spam massages, This messages are also similar to messages that a reader will use in identifying spam. The experimental work used a corpus of 227

2 1654 s which was over a period of some months received by an author. He states that the neural network like Naïve Bayes only need few features to get result. Neural network technique for classification of spam was also presented by D. Puniškis [9]. Attributes of the techniques comprises of the characteristics of the patterns that most network invaders deploy instead of making use of the context of keywords in the message. The dataset that was used in this experiment is corpus of 2788 non-spam and 1812 spam s that was put together for several months. The result that was acquired from this experiment actually shows that ANN is good but is not the best as it is not suitable to be used alone as tool for filtering spam. Dynamically, suspicious behavior method is a way of knowing detection success which will as well depends on the observable element from an agent externally. Due to the efficiency in executing malicious intend, the proposed method went through criticism. (Jacob et al.) and (Schultz et al,) [10,11], proposed the most inspired spam detection technique whose framework comprises of three learning algorithms; The first frame work was the rule based learner that generate Booleans rule based on feature attributes. The second frame work was the probabilistic technique creating a probability of a class been giving some features and finally, is a multiple classifier system that put together results from other classifier to create a prediction. This method includes strings and byte sequence that are extracted from malicious executable on the dataset as different type of features. We actually relate the bytes sequence method with our work and excellent result was achieved with high accuracy. Kolter and Maloof [3] Malicious executable were detected by the use of data mining and n-gram analysis, sequences of bytes was extracted from the executable, and then is been transformed in to n-grams which are then treated as features. 3. Detector Library Generated and Proposed Architecture For i =1 to N NSM (i) = NSM (i) + NSM (i - 1); If faffinity>= f affinity (x) = max; f affinity (y) = max; if fmatching = =.T. (b,x) >= ; (a,y) >= ; End if End Fig.1. Self and non-self detector library for Negative selection Algorithm. The hybrid model proposed in this paper can be divided in to three major process: To generate a self and non-self detector libraries as shown in the algorithm above and proposed in Ismaila and Ali [1]; this was generated from the training dataset made available from machine learning repository at the center for machine learning and intelligent system for classifying as self and non-self. The spam base last column indicated that the was considered spam (1) or non-spam (0). The dataset used in this technique has 4601 instances in which 39.4% are spams and each of the instances has 57 attributes. This data set was divided into two classes, we have the training dataset and the testing dataset which was divided in the ratio of 60% and 40% respectively. Secondly is to extract self vector and non-self vector each in training by the use of feature extraction and connect each of the vector to form a feature vector. Lastly is the use of the RBF neural network trained classifiers by using the self vector and non-self vector to detect the testing sample DEFINITIONS: x is a self data set (spam) y is a non-self data set (non-spam) N is the number of matching data SM(0)=0, NSM(0)=0; INPUT: /* is a threshold b /* b is the detector of x; a /* a is the detector of y; OUTPUT: Finding matching detector of both self and non-self BEGIN Input N; Input SM(1), NSM(1) /*SM is self matching and NSM is non-self matching; For i=1 to N SM(i) = SM(i) + SM (1- i); Next; Input Dataset Self and non-self library generation Self library Non-self library Self concentration Non-self concentration Concentration Vector Classifier Parameter Optimization Neural network Genetic algorithm Self and Non-self 228

3 ISSN: Fig.2. Architecture of the proposed technique. Neural Network Classification. The sample dataset are characterized by self and non-self feature vector after which are made on the feature vector using neural network. It is an adaptive system which changes the structure base on information that goes through the network in the process of learning as we are trying to simulate the biological function ability of neural network. The neural network topology uses the radial basis function as the activation function. It comprises of three layer: an input layer, a hidden layer with a non-linear activation function and a linear output layer. The sigmoid function represent the output layer of linear combination of hidden layer values, representing an inner probability that is made up of one node which serves as the label of the detected file. 1. Generation of Gene Library. From our previous work, Ismaila and Ali [1], a self and non-self memory was generated. This two library is known as the self gene library and the non-self gene library. Both the self and non-self gene library is composed of fragment (words) with at most representation of nonspam and spam respectively. Fragments that are found in non-spam and rarely found in spam is a very good representation of non-spam . To reflect a fragment tendency, it can be generated by the difference of its frequency in non-spam minus that of the spam . Fragments are sorted out in order of their differences after each of the frequency for each fragment as been calculated. The generation of gene libraries is describe in the algorithm below DEFINITIONS: sm is a self detector library (spam detector) nsm is a non-self detector library (non-spam detector) x is the fragment (word) which is the sample of the training set (fsm and fnsm) sm(0)=0, nsm(0)=0; INPUT: T /* Tendency b /* b is the gene library of x; a /* a is the gene library of y; OUTPUT: Finding the tendency of fragment x in both sm and nsm BEGIN Input x; Input sm(1),nsm(1) /*sm and nsm is its frequency appearing in both self detector and non-self detector; For i=1 to x sm(i) = sm(i) + sm (1- i); Next; For i =1 to x nsm (i) = nsm (i) +nsm (i - 1); If faffinity>= T f affinity (sm) = max; f affinity (smn) = max; if x = =.T. (b,sm) >=T; (a,nsm) >=T; end for For each fragment x in the sample of training set do f(t) = fsm fnsm if f(t) < 0 then x + sm x + smn end for Parameter (Psm and Pnsm) are to be adjusted. We remove both Psm% and Pnsm% in front and rear of the queue to form self and non-self gene library. Fig.3 Gene library Generated From the algorithm above, the tendency is acquired by the difference of its frequency in non-spam minus that in spam . The fragments are also sorted out accordingly in order of their difference after calculating the difference between each fragment frequency. For example, the two different fragment that are obtained from both front and rear of a queue with some population can be use to generate the self gene library and the non-self gene library. 2 Generating Feature Vector The proportion of the number of fragment in an that appears in a gene library is referred to as concentration of the to the number of different type of fragment that exist in the same . This is represented as follows. 𝐶= 𝑁 𝐹 (1) C represent concentration, N is the number of fragment appearing in both and gene library while F is the 229

4 number of different fragment in the . From our previous work, we should note that the gene library could be either self gene library or non-self gene library. For the classification, we construct a self concentration which describe its similarity to non-spam and a non-spam concentration which describes its similarity to spam. The time analysis of sorting x fragment, where we represent x as the number of candidate fragments after preprocessing, whose process takes place once during training stage is represented according to algorithm 1 by: 0(xlogx) (2) Also from equation 1, the time analysis of generating self concentration and non-self concentration during the running phase is represented as 0(n s *n x +n n * n x ) (3) ns and nn represent the number of fragment in both self gene library and non-self gene library respectively while nx is the number of fragment to be classified in the . Equation 3 is further represented as 0(n s + n n ) (4) As n s + n n < x, the time analysis for generating a two element feature vector for an element is at most 0(x). Fig. 4 Dataset Analysis Self concentration and non-self concentration which corresponds to self gene library and non-self gene library with different classification are trained and tested using Neural network and SVM aiming to find the concentration with the best performance. The result of both Ps and Pn is as illustrated in the figure below. 5. Experiment and Results The dataset used is from the center of machine learning and intelligent system. It was used to test the proposed techniques. The corpus is made up of 4601 instances with spam rate of 39.4%. The corpus is divided into partitions with approximate number of instances and spam rate. The spam dataset after division as 1813 instances while the non-spam dataset as 2788 instances. This is as represented below. The red indicate spam (1) while the green represent non-spam (0). A performance index was used for Type equation here.neural network and SVM to verify the effectiveness of the proposed technique. Clementine software package was used for SVM while Neural network is implemented with MATLAB of version R2009a Fig.5 Training result for both Neural Network and SVM 230

5 REFERENCES Fig.6 Testing result for both Neural network and SVM Fig. 5 and Fig. 6 above illustrated both training and testing results of the proposed model. Classification using Neural network for training is at its best at 9306% of accuracy while SVM is % accuracy. The testing accuracy for the Neural network is at 9017% with false positive rate of 0.299% while SVM is at % with false positive rate of 1.274%. 5. CONCLUSION The proposed model is able to have a good accuracy and false positive rate with the combination of Negative selection algorithm and Neural network technique compare with the SVM techniques. Computer system complexity is fast becoming a worrying issue and as tremendous influence in spam propagation. Antivirus finds it difficult to detect malware these days as it has become invisible in our computer system. In this paper, we present the self and non-self in a way to create efficiency of detector generation through model and algorithm. The novelty of this paper is to generate a new antibody method that vaccinates randomly created antibody by introducing a new self detector method, with respect to self and non-self producing advance antibody. In consequent research, we shall be looking at constant upgrade of the existing model of antibody (self) in other to prepare it against new spam. [1]. Ismaila I. and Ali.S. A Spam Detection Model Based on Negative Selection Algorithm.. is accepted by IJMIA: International Journal on Data Mining and Intelligent Information Technology Applications (ISSN: ) - (Accepted October 27, 2011) [2]. Christodorescu, Mihai, Jha, Somesh, Kruegel, Christopher. Mining specifications of malicious behavior. Proceedings of the the 6th joint meeting of the European software engineering on The foundations of software engineering, New York, NY, USA, p.5 14, 2007 [3]. Kolter, J. Zico, Maloof, Marcus A., learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res., 7: [4]. Wang, Jau-Hwang, Deng, P.S., Fan, Yi-Shen, Jaw, Li- Jing, Liu, Yu-Ching, Virus detection using data mining techinques. Security Technology, Proceedings. IEEE 37th Annual International Carnahan Conference on, p [5]. Henchiri, Olivier, Japkowicz, Nathalie, a feature selection and evaluation scheme for computer virus detection. Data Mining, IEEE International Conferenceon, 0: [6]. James Clark, Irena Koprinska, Josiah Poon, A Neural Network Based Approach to Automated Classification [7]. Levent Ozgur, Tunga Gungor, Fikert Gurgen, Adaptive anti-spam filtering for agglutinative languages: a special case for Turkish, Elsevier, 200 [8]. Ian Stuart, Sung-Hyuk Cha, and Charles Tappert, A Neural Network Classifier for Junk . Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004Stephanie Forrest and A.S. Perelson, Self nonself discrimination in computre. IEEE, 1994 [9]. D. Puniškis, R. Laurutis, R. Dirmeikis, An Artificial Neural Nets for Spam Recognition, electronics and electrical engineering ISSN Nr. 5(69) [10]. Jacob, Grlegoire, Debar, Hervle, Filiol, Eric, behavioural detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology, 4: [11]. Schultz, Matthew G., Eskin, Eleazar, Zadok, Erez, Stolfo, Salvatore J., data mining methods for detection of new malicious executables. Securityand Privacy, IEEE Symposium on, 0:0038. [doi: /secpri ]

Shafzon@yahool.com. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam

Shafzon@yahool.com. Keywords - Algorithm, Artificial immune system, E-mail Classification, Non-Spam, Spam An Improved AIS Based E-mail Classification Technique for Spam Detection Ismaila Idris Dept of Cyber Security Science, Fed. Uni. Of Tech. Minna, Niger State Idris.ismaila95@gmail.com Abdulhamid Shafi i

More information

A Content based Spam Filtering Using Optical Back Propagation Technique

A Content based Spam Filtering Using Optical Back Propagation Technique A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT

More information

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems

More information

Feature Subset Selection in E-mail Spam Detection

Feature Subset Selection in E-mail Spam Detection Feature Subset Selection in E-mail Spam Detection Amir Rajabi Behjat, Universiti Technology MARA, Malaysia IT Security for the Next Generation Asia Pacific & MEA Cup, Hong Kong 14-16 March, 2012 Feature

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing

More information

Email Spam Detection Using Customized SimHash Function

Email Spam Detection Using Customized SimHash Function International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email

More information

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey

More information

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015 RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering

More information

LARGE-SCALE MALWARE CLASSIFICATION USING RANDOM PROJECTIONS AND NEURAL NETWORKS

LARGE-SCALE MALWARE CLASSIFICATION USING RANDOM PROJECTIONS AND NEURAL NETWORKS LARGE-SCALE MALWARE CLASSIFICATION USING RANDOM PROJECTIONS AND NEURAL NETWORKS George E. Dahl University of Toronto Department of Computer Science Toronto, ON, Canada Jack W. Stokes, Li Deng, Dong Yu

More information

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College

More information

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet

More information

MEF: Malicious Email Filter A UNIX Mail Filter that Detects Malicious Windows Executables

MEF: Malicious Email Filter A UNIX Mail Filter that Detects Malicious Windows Executables MEF: Malicious Email Filter A UNIX Mail Filter that Detects Malicious Windows Executables Matthew G. Schultz and Eleazar Eskin Department of Computer Science Columbia University {mgs,eeskin}@cs.columbia.edu

More information

Spam Filtering using Naïve Bayesian Classification

Spam Filtering using Naïve Bayesian Classification Spam Filtering using Naïve Bayesian Classification Presented by: Samer Younes Outline What is spam anyway? Some statistics Why is Spam a Problem Major Techniques for Classifying Spam Transport Level Filtering

More information

DATA MINING TECHNIQUES AND APPLICATIONS

DATA MINING TECHNIQUES AND APPLICATIONS DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,

More information

Immunity from spam: an analysis of an artificial immune system for junk email detection

Immunity from spam: an analysis of an artificial immune system for junk email detection Immunity from spam: an analysis of an artificial immune system for junk email detection Terri Oda and Tony White Carleton University, Ottawa ON, Canada terri@zone12.com, arpwhite@scs.carleton.ca Abstract.

More information

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM

A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM A DETECTOR GENERATING ALGORITHM FOR INTRUSION DETECTION INSPIRED BY ARTIFICIAL IMMUNE SYSTEM Walid Mohamed Alsharafi and Mohd Nizam Omar Inter Networks Research Laboratory, School of Computing, College

More information

Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks

Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks Priyank Singhal Student, Computer Engineering Sardar Patel Institute of Technology University

More information

How To Filter Spam Image From A Picture By Color Or Color

How To Filter Spam Image From A Picture By Color Or Color Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among

More information

Credit Card Fraud Detection Using Self Organised Map

Credit Card Fraud Detection Using Self Organised Map International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud

More information

Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier

Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier Feature Selection using Integer and Binary coded Genetic Algorithm to improve the performance of SVM Classifier D.Nithya a, *, V.Suganya b,1, R.Saranya Irudaya Mary c,1 Abstract - This paper presents,

More information

Customer Relationship Management using Adaptive Resonance Theory

Customer Relationship Management using Adaptive Resonance Theory Customer Relationship Management using Adaptive Resonance Theory Manjari Anand M.Tech.Scholar Zubair Khan Associate Professor Ravi S. Shukla Associate Professor ABSTRACT CRM is a kind of implemented model

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2

SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2 International Journal of Computer Engineering and Applications, Volume IX, Issue I, January 15 SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Classification algorithm in Data mining: An Overview

Classification algorithm in Data mining: An Overview Classification algorithm in Data mining: An Overview S.Neelamegam #1, Dr.E.Ramaraj *2 #1 M.phil Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi. *2 Professor, Department

More information

KEITH LEHNERT AND ERIC FRIEDRICH

KEITH LEHNERT AND ERIC FRIEDRICH MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They

More information

Spam detection with data mining method:

Spam detection with data mining method: Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,

More information

A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering

A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering Khurum Nazir Junejo, Mirza Muhammad Yousaf, and Asim Karim Dept. of Computer Science, Lahore University of Management Sciences

More information

Increasing the Accuracy of a Spam-Detecting Artificial Immune System

Increasing the Accuracy of a Spam-Detecting Artificial Immune System Increasing the Accuracy of a Spam-Detecting Artificial Immune System Terri Oda Carleton University terri@zone12.com Tony White Carleton University arpwhite@scs.carleton.ca Abstract- Spam, the electronic

More information

agoweder@yahoo.com ** The High Institute of Zahra for Comperhensive Professions, Zahra-Libya

agoweder@yahoo.com ** The High Institute of Zahra for Comperhensive Professions, Zahra-Libya AN ANTI-SPAM SYSTEM USING ARTIFICIAL NEURAL NETWORKS AND GENETIC ALGORITHMS ABDUELBASET M. GOWEDER *, TARIK RASHED **, ALI S. ELBEKAIE ***, and HUSIEN A. ALHAMMI **** * The High Institute of Surman for

More information

A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach

A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering

More information

A survey on Data Mining based Intrusion Detection Systems

A survey on Data Mining based Intrusion Detection Systems International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion

More information

Machine learning for algo trading

Machine learning for algo trading Machine learning for algo trading An introduction for nonmathematicians Dr. Aly Kassam Overview High level introduction to machine learning A machine learning bestiary What has all this got to do with

More information

How To Use Neural Networks In Data Mining

How To Use Neural Networks In Data Mining International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and

More information

Active Learning SVM for Blogs recommendation

Active Learning SVM for Blogs recommendation Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the

More information

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

Towards better accuracy for Spam predictions

Towards better accuracy for Spam predictions Towards better accuracy for Spam predictions Chengyan Zhao Department of Computer Science University of Toronto Toronto, Ontario, Canada M5S 2E4 czhao@cs.toronto.edu Abstract Spam identification is crucial

More information

SURVEY OF TEXT CLASSIFICATION ALGORITHMS FOR SPAM FILTERING

SURVEY OF TEXT CLASSIFICATION ALGORITHMS FOR SPAM FILTERING I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 233-237 SURVEY OF TEXT CLASSIFICATION ALGORITHMS FOR SPAM FILTERING K. SARULADHA 1 AND L. SASIREKA 2 1 Assistant Professor, Department of Computer Science and

More information

Predict Influencers in the Social Network

Predict Influencers in the Social Network Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, lyzhou@stanford.edu Department of Electrical Engineering, Stanford University Abstract Given two persons

More information

An Artificial Immune Model for Network Intrusion Detection

An Artificial Immune Model for Network Intrusion Detection An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,

More information

An Efficient Three-phase Email Spam Filtering Technique

An Efficient Three-phase Email Spam Filtering Technique An Efficient Three-phase Email Filtering Technique Tarek M. Mahmoud 1 *, Alaa Ismail El-Nashar 2 *, Tarek Abd-El-Hafeez 3 *, Marwa Khairy 4 * 1, 2, 3 Faculty of science, Computer Sci. Dept., Minia University,

More information

8. Machine Learning Applied Artificial Intelligence

8. Machine Learning Applied Artificial Intelligence 8. Machine Learning Applied Artificial Intelligence Prof. Dr. Bernhard Humm Faculty of Computer Science Hochschule Darmstadt University of Applied Sciences 1 Retrospective Natural Language Processing Name

More information

HYBRID PROBABILITY BASED ENSEMBLES FOR BANKRUPTCY PREDICTION

HYBRID PROBABILITY BASED ENSEMBLES FOR BANKRUPTCY PREDICTION HYBRID PROBABILITY BASED ENSEMBLES FOR BANKRUPTCY PREDICTION Chihli Hung 1, Jing Hong Chen 2, Stefan Wermter 3, 1,2 Department of Management Information Systems, Chung Yuan Christian University, Taiwan

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2

A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 UDC 004.75 A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 I. Mashechkin, M. Petrovskiy, A. Rozinkin, S. Gerasimov Computer Science Department, Lomonosov Moscow State University,

More information

Establishing the Uniqueness of the Human Voice for Security Applications

Establishing the Uniqueness of the Human Voice for Security Applications Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.

More information

Machine Learning Final Project Spam Email Filtering

Machine Learning Final Project Spam Email Filtering Machine Learning Final Project Spam Email Filtering March 2013 Shahar Yifrah Guy Lev Table of Content 1. OVERVIEW... 3 2. DATASET... 3 2.1 SOURCE... 3 2.2 CREATION OF TRAINING AND TEST SETS... 4 2.3 FEATURE

More information

Evaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring

Evaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring 714 Evaluation of Feature election Methods for Predictive Modeling Using Neural Networks in Credits coring Raghavendra B. K. Dr. M.G.R. Educational and Research Institute, Chennai-95 Email: raghavendra_bk@rediffmail.com

More information

Machine Learning for Naive Bayesian Spam Filter Tokenization

Machine Learning for Naive Bayesian Spam Filter Tokenization Machine Learning for Naive Bayesian Spam Filter Tokenization Michael Bevilacqua-Linn December 20, 2003 Abstract Background Traditional client level spam filters rely on rule based heuristics. While these

More information

Spam? Not Any More! Detecting Spam emails using neural networks

Spam? Not Any More! Detecting Spam emails using neural networks Spam? Not Any More! Detecting Spam emails using neural networks ECE / CS / ME 539 Project Submitted by Sivanadyan, Thiagarajan Last Name First Name TABLE OF CONTENTS 1. INTRODUCTION...2 1.1 Importance

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

Programming Exercise 3: Multi-class Classification and Neural Networks

Programming Exercise 3: Multi-class Classification and Neural Networks Programming Exercise 3: Multi-class Classification and Neural Networks Machine Learning November 4, 2011 Introduction In this exercise, you will implement one-vs-all logistic regression and neural networks

More information

Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap

Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security

More information

Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type.

Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type. Chronological Sampling for Email Filtering Ching-Lung Fu 2, Daniel Silver 1, and James Blustein 2 1 Acadia University, Wolfville, Nova Scotia, Canada 2 Dalhousie University, Halifax, Nova Scotia, Canada

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval

Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!

More information

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the

More information

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO)

14.10.2014. Overview. Swarms in nature. Fish, birds, ants, termites, Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) Overview Kyrre Glette kyrrehg@ifi INF3490 Swarm Intelligence Particle Swarm Optimization Introduction to swarm intelligence principles Particle Swarm Optimization (PSO) 3 Swarms in nature Fish, birds,

More information

Bayesian Spam Filtering

Bayesian Spam Filtering Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary amaobied@ucalgary.ca http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating

More information

High-Speed Detection of Unsolicited Bulk Email

High-Speed Detection of Unsolicited Bulk Email High-Speed Detection of Unsolicited Bulk Email Sheng-Ya Lin, Cheng-Chung Tan, Jyh-Charn (Steve) Liu, Computer Science Department, Texas A&M University Michael Oehler National Security Agency Dec, 4, 2007

More information

CS 6220: Data Mining Techniques Course Project Description

CS 6220: Data Mining Techniques Course Project Description CS 6220: Data Mining Techniques Course Project Description College of Computer and Information Science Northeastern University Spring 2013 General Goal In this project, you will have an opportunity to

More information

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets

Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, fabian.gruening@informatik.uni-oldenburg.de Abstract: Independent

More information

Comparison of K-means and Backpropagation Data Mining Algorithms

Comparison of K-means and Backpropagation Data Mining Algorithms Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and

More information

Anti-Spam Filter Based on Naïve Bayes, SVM, and KNN model

Anti-Spam Filter Based on Naïve Bayes, SVM, and KNN model AI TERM PROJECT GROUP 14 1 Anti-Spam Filter Based on,, and model Yun-Nung Chen, Che-An Lu, Chao-Yu Huang Abstract spam email filters are a well-known and powerful type of filters. We construct different

More information

Machine Learning using MapReduce

Machine Learning using MapReduce Machine Learning using MapReduce What is Machine Learning Machine learning is a subfield of artificial intelligence concerned with techniques that allow computers to improve their outputs based on previous

More information

Bagged Ensemble Classifiers for Sentiment Classification of Movie Reviews

Bagged Ensemble Classifiers for Sentiment Classification of Movie Reviews www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3951-3961 Bagged Ensemble Classifiers for Sentiment Classification of Movie

More information

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

Tweaking Naïve Bayes classifier for intelligent spam detection

Tweaking Naïve Bayes classifier for intelligent spam detection 682 Tweaking Naïve Bayes classifier for intelligent spam detection Ankita Raturi 1 and Sunil Pranit Lal 2 1 University of California, Irvine, CA 92697, USA. araturi@uci.edu 2 School of Computing, Information

More information

T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier. Santosh Tirunagari : 245577

T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier. Santosh Tirunagari : 245577 T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier Santosh Tirunagari : 245577 January 20, 2011 Abstract This term project gives a solution how to classify an email as spam or

More information

A Survey on Intrusion Detection System with Data Mining Techniques

A Survey on Intrusion Detection System with Data Mining Techniques A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,

More information

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of

More information

Performance Based Evaluation of New Software Testing Using Artificial Neural Network

Performance Based Evaluation of New Software Testing Using Artificial Neural Network Performance Based Evaluation of New Software Testing Using Artificial Neural Network Jogi John 1, Mangesh Wanjari 2 1 Priyadarshini College of Engineering, Nagpur, Maharashtra, India 2 Shri Ramdeobaba

More information

Tracking Groups of Pedestrians in Video Sequences

Tracking Groups of Pedestrians in Video Sequences Tracking Groups of Pedestrians in Video Sequences Jorge S. Marques Pedro M. Jorge Arnaldo J. Abrantes J. M. Lemos IST / ISR ISEL / IST ISEL INESC-ID / IST Lisbon, Portugal Lisbon, Portugal Lisbon, Portugal

More information

ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS

ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS ANALYSIS OF FEATURE SELECTION WITH CLASSFICATION: BREAST CANCER DATASETS Abstract D.Lavanya * Department of Computer Science, Sri Padmavathi Mahila University Tirupati, Andhra Pradesh, 517501, India lav_dlr@yahoo.com

More information

Stabilization by Conceptual Duplication in Adaptive Resonance Theory

Stabilization by Conceptual Duplication in Adaptive Resonance Theory Stabilization by Conceptual Duplication in Adaptive Resonance Theory Louis Massey Royal Military College of Canada Department of Mathematics and Computer Science PO Box 17000 Station Forces Kingston, Ontario,

More information

Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages

Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages Tunga Güngör and Ali Çıltık Boğaziçi University, Computer Engineering Department, Bebek, 34342 İstanbul, Turkey

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

Question 2 Naïve Bayes (16 points)

Question 2 Naïve Bayes (16 points) Question 2 Naïve Bayes (16 points) About 2/3 of your email is spam so you downloaded an open source spam filter based on word occurrences that uses the Naive Bayes classifier. Assume you collected the

More information

Spam Detection and Pattern Recognition

Spam Detection and Pattern Recognition International Journal of Signal Processing, Image Processing and Pattern Recognition 31 Learning to Detect Spam: Naive-Euclidean Approach Tony Y.T. Chan, Jie Ji, and Qiangfu Zhao The University of Akureyri,

More information

Efficient Security Alert Management System

Efficient Security Alert Management System Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,

More information

INVESTIGATIONS INTO EFFECTIVENESS OF GAUSSIAN AND NEAREST MEAN CLASSIFIERS FOR SPAM DETECTION

INVESTIGATIONS INTO EFFECTIVENESS OF GAUSSIAN AND NEAREST MEAN CLASSIFIERS FOR SPAM DETECTION INVESTIGATIONS INTO EFFECTIVENESS OF AND CLASSIFIERS FOR SPAM DETECTION Upasna Attri C.S.E. Department, DAV Institute of Engineering and Technology, Jalandhar (India) upasnaa.8@gmail.com Harpreet Kaur

More information

CS 348: Introduction to Artificial Intelligence Lab 2: Spam Filtering

CS 348: Introduction to Artificial Intelligence Lab 2: Spam Filtering THE PROBLEM Spam is e-mail that is both unsolicited by the recipient and sent in substantively identical form to many recipients. In 2004, MSNBC reported that spam accounted for 66% of all electronic mail.

More information

How To Create A Text Classification System For Spam Filtering

How To Create A Text Classification System For Spam Filtering Term Discrimination Based Robust Text Classification with Application to Email Spam Filtering PhD Thesis Khurum Nazir Junejo 2004-03-0018 Advisor: Dr. Asim Karim Department of Computer Science Syed Babar

More information

Role of Neural network in data mining

Role of Neural network in data mining Role of Neural network in data mining Chitranjanjit kaur Associate Prof Guru Nanak College, Sukhchainana Phagwara,(GNDU) Punjab, India Pooja kapoor Associate Prof Swami Sarvanand Group Of Institutes Dinanagar(PTU)

More information

Analytics on Big Data

Analytics on Big Data Analytics on Big Data Riccardo Torlone Università Roma Tre Credits: Mohamed Eltabakh (WPI) Analytics The discovery and communication of meaningful patterns in data (Wikipedia) It relies on data analysis

More information

Data Pre-Processing in Spam Detection

Data Pre-Processing in Spam Detection IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 11 May 2015 ISSN (online): 2349-784X Data Pre-Processing in Spam Detection Anjali Sharma Dr. Manisha Manisha Dr. Rekha Jain

More information

A Victimization Optical Back Propagation Technique in Content Based Mostly Spam Filtering

A Victimization Optical Back Propagation Technique in Content Based Mostly Spam Filtering A Victimization Optical Back Propagation Technique in Content Based Mostly Spam Filtering Dr.Kathir.Viswalingam 1, G.Ayyappan 2 Dean (R&D), Bharath University, Chennai, India 1 Assistant Professor, Department

More information

ANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line

ANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 2016 E-ISSN: 2347-2693 ANN Based Fault Classifier and Fault Locator for Double Circuit

More information

Novelty Detection in image recognition using IRF Neural Networks properties

Novelty Detection in image recognition using IRF Neural Networks properties Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,

More information

International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org

International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org IMPROVING PEFORMANCE OF BAYESIAN SPAM FILTER Firozbhai Ahamadbhai Sherasiya 1, Prof. Upen Nathwani 2 1 2 Computer Engineering Department 1 2 Noble Group of Institutions 1 firozsherasiya@gmail.com ABSTARCT:

More information

1. Classification problems

1. Classification problems Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification

More information

wealak@yahoo.com Sherif.shawki@gmail.com

wealak@yahoo.com Sherif.shawki@gmail.com MACHINE LEARNING METHODS FOR SPAM E-MAIL CLASSIFICATION ABSTRACT W.A. Awad 1 and S.M. ELseuofi 2 1 Math.&Comp.Sci.Dept., Science faculty, Port Said University wealak@yahoo.com 2 Inf. System Dept.,Ras El

More information

Price Prediction of Share Market using Artificial Neural Network (ANN)

Price Prediction of Share Market using Artificial Neural Network (ANN) Prediction of Share Market using Artificial Neural Network (ANN) Zabir Haider Khan Department of CSE, SUST, Sylhet, Bangladesh Tasnim Sharmin Alin Department of CSE, SUST, Sylhet, Bangladesh Md. Akter

More information

NEURAL NETWORKS IN DATA MINING

NEURAL NETWORKS IN DATA MINING NEURAL NETWORKS IN DATA MINING 1 DR. YASHPAL SINGH, 2 ALOK SINGH CHAUHAN 1 Reader, Bundelkhand Institute of Engineering & Technology, Jhansi, India 2 Lecturer, United Institute of Management, Allahabad,

More information